2012
DOI: 10.1007/978-3-642-27901-0_8
|View full text |Cite
|
Sign up to set email alerts
|

A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…It can be derived from the results that none of the sequences fail the first and second binary derivative test because all of the significance probabilities are all greater than 0.001. The equal number of ones and zeros in the first binary derivative stream indicates that the original stream contains an equal proportion of overlapping four 2-tuples, (00), (01), (10), (11). It can be observed that the stream ciphers RC4 and Sober then PROPOSED ALGORITHM and Rabbit results seems to be less patterned than the others.…”
Section: Binary Derivative Testmentioning
confidence: 99%
See 1 more Smart Citation
“…It can be derived from the results that none of the sequences fail the first and second binary derivative test because all of the significance probabilities are all greater than 0.001. The equal number of ones and zeros in the first binary derivative stream indicates that the original stream contains an equal proportion of overlapping four 2-tuples, (00), (01), (10), (11). It can be observed that the stream ciphers RC4 and Sober then PROPOSED ALGORITHM and Rabbit results seems to be less patterned than the others.…”
Section: Binary Derivative Testmentioning
confidence: 99%
“…The One-Time Pad, which is supposed to employ a purely random key, can potentially achieve "perfect secrecy". That is, it's supposed to be fully immune to brute force attacks [9][10][11]. The proposed algorithm based non-Festal structure with well-designed substitution boxes (S-Box), permutation networks, and a serial-parallel construction functions, in addition to key derivation algorithm which used the input secret key to generate sub-keys for the proposed algorithm.…”
Section: Introductionmentioning
confidence: 99%